The 4th ACM ASIA Public-Key Cryptography Workshop (APKC 2017)

  April 2, 2017, Abu Dhabi, UAE



Welcome to APKC 2017

Public key cryptography plays an essential role in ensuring many security properties required in data processing of various kinds. The theme of this workshop is novel public key cryptosystems for solving a wide range of real-life application problems. This workshop solicits original contributions on both applied and theoretical aspects of public key cryptography.
The 1st edition of the event (ASIAPKC 2013, DBLP) was held in Hangzhou, China, the 2nd ASIAPKC (ASIAPKC 2014, DBLP) was held in Kyoto, Japan and the 3rd ASIAPKC (ASIAPKC 2016, DBLP) was held in Xi’an, China. The 4th edition of the event (APKC 2017) will be held in April 2, 2017 in Abu Dhabi, UAE, in conjunction with AsiaCCS 2017 (Web).

Important Dates

Submission Deadline: Dec. 8, 2016 (Extend to Dec. 29, 2016)

Notification: Jan. 25, 2017 (Extend to Feb. 10, 2017)

Proceedings Version Deadline: Feb. 22, 2017 (Extend to Feb. 16, 2017)

APKC Workshop: Apr. 2, 2017

Call for Papers

As in the previous ASIAPKC series, the proceedings of APKC 2017 will be published by ACM Press and appear in ACM digital library.

Topics of interest to the workshop include, but are not limited to:

  • Applied public-key cryptography for solving emerging application problems
  • Provably-secure public-key primitives and protocols
  • Key management for, and by, public-key cryptosystems
  • Privacy-preserving cryptographic computations
  • Two-party and multi-party computations
  • Homomorphic public-key cryptosystems
  • Attributed-based and functional public-key cryptography
  • Digital signatures with special properties
  • System security properties of public-key cryptography
  • Post-quantum public-key cryptography
  • Fast implementation of public-key cryptosystems

Contact E-mail:



Submission Page:

Instructions for authors:

Submission must be written in English. Submitted papers must be no longer than 10 pages excluding references and appendices, and no longer than 12 pages in total. Committee members are not obligated to read appendices, and a paper must be intelligible without the appendices. Submitted papers must be in the double-column ACMSIG Proceedings format (, both Option 1 and Option 2 on the page are fine) with page numbers marked. No changes to margins, spacing, or font sizes are allowed from those specified by the style file. The workshop reserves the right to request the source files for a submission to verify compliance with these requirements. Submitted papers must be PDF files.

Submitted papers must be appropriately anonymized. No information about author's name should be identifiable from the paper (including abstract, related work, references). When citing one's own previous work, third person should be used. Submitted papers must not substantially overlap papers that have been published or are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is prohibited. Authors of accepted papers must guarantee that their papers will be presented at the workshop. The Program Committee reserves the right to reject any paper that does not abide by the rules without considering its technical merits.

Camera Ready


The authors of accepted papers should prepare their papers according to, and submit their papers to the direct link in the email from Sheridan Communications by Mar. 1. The final papers must be no longer than 10 pages excluding references and appendices, and no longer than 12 pages in total. Please submit the final version via Easychair submition page:

APKC 2017 has already opened registration. As usual, please register AsiaCCS 2017 (even if you only attend the workshop). Note that in order to include their paper in the final proceedings to be published in ACM Digital Library, the authors must present their paper at the workshop. Otherwise, the paper may still risk being removed from the final proceedings.


Program Co-Chairs  
Joonsang Baek Khalifa University of Science, Technology and Research, United Arab Emirates
Rui Zhang Chinese Academy of Sciences, China
Program Committee
Man Ho Au Hong Kong Polytechnic University, Hong Kong
Joonsang Baek (co-chair) Khalifa University of Science, Technology and Research, United Arab Emirates
Jie Chen East China Normal University, China
Sherman S.M. Chow Chinese University of Hong Kong, Hong Kong
Cheng-Kang Chu Huawei, Singapore
Keita Emura NICT, Japan
Steven Galbraith Auckland University, New Zealand
Jinguang Han Nanjing University of Finance and Economics, China
Debiao He Wuhan University, China
Qiong Huang South China Agricultural University, China
Shaoquan Jiang University of Electronic Science and Technology of China, China
Miroslaw Kutylowski Wroclaw University of Technology, Poland
Kaitai Liang Manchester Metropolitan University, UK
Mark Manulis University of Surrey, UK
Baodong Qin Southwest University of Science and Technology, China
Jacob Schuldt AIST, Japan
Jun Shao Zhejiang Gongshang University, China
Chunhua Su Osaka University, Japan
Willy Susilo University of Wollongong, Australia
Ilsun You Soonchunhyang University, Korea
Yong Yu University of Electronic Science and Technology of China, China
Rui Zhang (co-chair) Chinese Academy of Sciences, China


09:00--09:10 Welcome
Session 1: Signatures and Applications (Chair: Rui Zhang)
09:10--09:35 Two-Move and Setup-Free Blind Signatures with Perfect Blindness
  Lucjan Hanzlik and Kamil (Wrocław University of Science and Technology, Poland)
09:35--10:00 An Efficient Verification of CL-LRSW Signatures and a Pseudonym Certificate System
  Marcin Slowik and Marta Wszola (Wrocław University of Science and Technology, Poland)
10:00--10:25 One-time Programs with Cloud Storage and Its Application to Electronic Money
  Takuya Kitamura, Kazumasa Shinagawa, Takashi Nishide and Eiji Okamoto (University of Tsukuba, Japan)
10:25--10:55 Coffee Break
Session 2: Learning With Errors Problems (Chair: Joonsang Baek)
10:55--11:20 KDM and Selective Opening Secure IBE Based on the LWE Problem
  Jingnan He, Bao Li, Xianhui Lu, Dingding Jia and Wenpan Jing (Chinese Academy of Sciences, China)
11:20--11:45 Access Control Encryption Based on LWE
  Gaosheng Tan, Rui Zhang, Hui Ma and Yang Tao (Chinese Academy of Sciences, China)